31. July 2021

Threat actors leaked data stolen from EA, including FIFA code

The Silver Bullet for Ransomware’s Golden Goose

BSides Vancouver 2021 – Josh Sokol’s ‘Measuring Cybersecurity Maturity With The NIST CSF’

SolarWinds hackers breached 27 state attorneys’ offices

3 Redefined Trends for Cyber Security Investing (2021)

Top 10 Best Free Antivirus Download For PC 2021

BSides Vancouver 2021 – Patience Mpofu’s ‘In-App Protection For Android: Selecting The Right Platform’

XKCD ‘Universal Seatbelt’

‘Numberless’ bank cards could be the future: here’s why

The Top 30 Vulnerabilities Include Plenty of Usual Suspects

Bot that helps hackers write code

Seven-Fold Surge in Dark Web Ads Providing Corporate Network Access

Malwarebytes 4.4.4 adds RDP Brute Force Protection among other things

The Top 30 Cybersecurity Bugs Include Plenty of Usual Suspects

Aqua Security: 97% unaware of crucial cloud native security principles

Top Stories: Face ID on Future Macs, Elon Musk Criticizes Apple, and More

Following a Ransomware Cyberattack, D-BOX Stated it is Gradually Restarting Operations

Two Belarusian Arrested in Black Box ATM Attack

Wiper Malware Used in Attack Against Iranian Railway

Zimbra Webmail Platform Vulnerabilities Discovered That Could Compromise Mail Servers

‘Build’ or ‘Buy’ your own antivirus product

Wiper Malware Threat Looms Over Tokyo Olympics

Bumper Telegram Update Enables Video Calls With Up to 1,000 Viewers

Sysadmins: Why not simply verify there’s no backdoor in every program you install, and thus avoid any cyber-drama?

Weekly Update 254

Android Banking Trojan Vultur uses screen recording for credentials stealing

Northern Virginia Talent Initiative Website Draws 483,000 Visitors and 72,000 Job Views

CloudCover Announces Two New Appointments to Board of Directors

New Harris Poll: Cybersecurity Fears May Stall COVID-19 Digital Vaccine Card Adoption in the United States and United Kingdom, Identity Theft and Fake Cards Top List of Concerns

How can Digital First banking benefit financial institutions?

Zerto 9 brings immutability and automation for ransomware resilience

Watch out for these scams, targeting Amazon’s customers

Week in security with Tony Anscombe

GDPR: What Cloud Service Providers Should Know

BehavioSec extends its behavioral biometrics platform into a SOC/ISO compliant SaaS version

White House says agencies will pay for COVID tests as needed for feds

Ransomware attempt volume sets record, reaches more than 300 million for first half of 2021: SonicWall

Infosys implements its IaaS solution for SPS in collaboration with Hitachi Vantara

Securitas acquires Protection One to enhance its protective services capabilities in Germany

This ethical hacking course could give your cybersecurity career a boost

LogicGate raises $113M to fuel innovation and accelerate growth

OpenSSF adds new members from around the globe to improve OSS security

Top Microsegmentation Software for 2021

API Attack Traffic Grew 300+% In the Last Six Months

Crooks using phony call centers to spread ransomware via BazaCall attacks

IT Security News Daily Summary 2021-07-30

Identity Governance 101: Popular User Stories

6 ways to protect your pharma company from cyberattacks

NSA Warns Public Networks are Hacker Hotbeds

Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial

What’s New With Find My in iOS 15: Tracking When iPhone is Off, Live Locations, Locate After Erase and More

Create a VirtualBox virtual machine backup on a Linux host for security

Commerce bots speed HR services delivery

The SysAdmin Class for the World’s Greatest Role-Playing Game

Senate-passed bill looks to modernize federal contracting, expand small business opportunities

Ransomware risk management: How to start preparing for the future now

Secure applications with Keycloak authentication tool

Keycloak tutorial: How to secure different application types

The New McAfee: A Bold New World of Protection Online

5 Ways to Increase Password Safety

Indiana to test EV charging concrete

Use ISO 22332 to improve business continuity plans

Free Ransomware Decryption Site Celebrates Milestone as New Threats Emerge

BSides Vancouver 2021 – June Jeremiah’s ‘Human Vulnerability Management And Assessment In the Age of Zero Trust’

‘Unicorn Hunters’ Show Starring Steve Wozniak and Lance Bass Seeks TV Distribution

This Week in Security News – July 30, 2021

What the evolution of AI/ML means for government IT

MacRumors Giveaway: Win an Everyday Briefcase and Magnetic Sleeve for Mac From Harber London

Algorithm could improve how self-driving cars take on narrow streets

CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines

LemonDuck no longer settles for breadcrumbs

Implementing a Forgot Password Flow With Pseudo-Code

Cyber-physical attacks: Top 5 things to know

Top 5 things to know about cyber-physical attacks

Cryptomining scams target Android app users

People of JumpCloud | Ryan Conway

I Am Parting With My Crypto Library

Elon Musk: Apple’s App Store Fees Are a ‘De Facto Global Tax on the Internet’

Kais Saied’s Power Grab in Tunisia

CISA debuts vulnerability disclosure platform

DDoS attacks are down 38.8% in Q2 2021

Estonian Hacker Steals 300,000 Government ID Photos

Elon Musk Reportedly Demanded to Become Apple CEO as Part of Potential Tesla Acquisition [Update: Musk Denies]

Apple Shipped More Tablets Than Samsung and Amazon Did Combined Last Quarter

READY for What’s New at (ISC)² Security Congress in 2021?

Fidelis Vulnerability and Trends Report – Q2 2021

Why digital issuance is the perfect recipe for modern financial services

Russian APT29 Used 30+ C&C Servers Uncovered Linked to “WellMess” Malware

XAMPP Hosts are Employed to Distribute Agent Tesla

Severe Shopify Flaw Exposed GitHub Access Token And Source Code Repositories

Elon Musk Reportedly Demanded to Become Apple CEO as Part of Potential Tesla Acquisition

Here’s 30 servers Russian intelligence uses to fling malware at the West, beams RiskIQ

Amazon penalized 746m Euros over Data Security in UK

BrandPost: Zero trust’s missing link: application whitelisting

DOS (disk operating system)

Russia’s APT29 Still Actively Delivering Malware Used in COVID-19 Vaccine Spying

Android Banking Trojan ‘Vultur’ Abusing Accessibility Services

Enterprises look to formalize WFH network architecture

Javascript Scanning Now Supported In Jetbrains IDEs: Intellij IDEA, Webstorm, and More

Spear-phishing now targets employees outside the finance and executive teams, report says

CSO Global Intelligence Report: The State of Cybersecurity in 2021

Securing the Software Supply Chain

FCW Insider: July 30, 2021

Globally connected data can safeguard the defense industrial and technology base

Novel Meteor Wiper Used in Attack that Crippled Iranian Train System

Statue of Liberty is a Monument to Abolition of Slavery

Revamped Apple Maps Now Being Tested in Italy

Deals: Shop the Best Tech-Related Back To School Sales From Twelve South, Nimble, Nomad, and More

private key

Iranian Hackers Posed as Aerobics Instructors to Target Aerospace Employees

HTML Smuggling is a New Threat Targetting Browsers

Eight New Games Came to Apple Arcade This Month, Including ‘Solitaire Stories,’ ‘Ultimate Rivals: The Court,’ and ‘Detonation Racing’

Apple Patched Zero-Day Bug Under Attack For Mac and iOS Devices

Critical Shopify Vulnerability Exposed GitHub Access Token And Shopify Repos

Massive Cyberattack Led to Khaos in Iranian Train System

Chinese Cybercriminals Implant PlugX Variant on Hacked Exchange Servers

Window of Exposure is Expanding and Hackers Know Exactly Where to Strike

New Chinese Threat Group ‘GhostEmperor’ Targets Governments, Telecom Firms

Inside The Bitcoin Mine With Its Own Power Plant

Security Team Finds Crimea Manifesto Buried In VBA Rat

Cisco Researchers Spotlight Solarmarker Malware

Vultur Bank Malware Infests Thousands Of Devices

What is a VPN and why do you need one? Everything you need to know

ProtonVPN gets serious speed boost with VPN Accelerator

IBM: Average Cost of Data Breach Exceeds $4.2M

Top 30 Critical Security Flaws Most Used by Cybercriminals

“Beijing One Pass” Employee Benefits Software Exhibits Spyware Characteristics

Cybercriminal Arrested For Stealing 286K ID Scans from Estonia Government Database

Building Effective Business Cases to Cover Cybersecurity Costs

CISA Announces Vulnerability Disclosure Policy (VDP) Platform

How to Secure Your Wireless Devices?

Google Explains New Safety and Privacy Guidelines for Android Apps

BrandPost: Lessons in Security: School District Shares Pandemic Experiences

Crippling attack on Iranian trains linked to Meteor file wiper malware

Remote Code Execution Flaws Patched in WordPress Download Manager Plugin

S3 Ep43: Apple 0-day, pygmy hippos, hive nightmares and Twitter hacker bust [Podcast]

Google Workspace vs. G Suite: Demystifying Google Workspace

iPhone 13 and Redesigned MacBook Pro Chip Production Hit With Gas Contamination

Connectedness and Culture: My Summer as an Employee Programs Intern

TSMC Warns Of Gas Contamination At Key Chip Factory

Microsoft: This unusual Windows and Linux malware does everything it can to stay on your network

Microsoft Shares More Information on Protecting Systems Against PetitPotam Attacks

Why I Joined Cisco Security and Its Culture of Innovation and Inclusion

Amazon Online Sales Growth Slows Amid Lockdown Easing

VPN deal: Save 30% on the highest-rated VPN services

The Privacy Battle That Apple Isn’t Fighting

Storing Encrypted Photos in Google’s Cloud

New PayPal Credential Phishing Scam Conducted Via Live Chat Service

Cybercriminals Use Chipotle’s Marketing Account for Phishing Attacks

Stellar Converter for EDB Review – Advanced Tool to Convert EDB Files to PST

Microsoft Alerts Users About PetiPotam NTLM Relay Attack

UC San Diego Health Discloses Data Breach Exposing Personal Information

Biden memo, infrastructure deal deliver cybersecurity performance goals and money

21-Year-Old Woman Pleads Guilty to Sending Phishing Emails to Political Candidates

Google To Tempt iOS Users With Android Switch App

Check Point Software Wins Microsoft US Award for Energy, Emphasizing Commitment to Customers

Microsoft warns: These attackers can go from first contact to launching ransomware in just 48 hours

HTML smuggling is the latest cybercrime tactic you need to worry about

S.Africa’s Port Terminals Restored Following Cyber-Attack

UBEL is the Android Malware Successor to Oscorp

Malicious Linux Shell Scripts Used to Evade Defenses

MeteorExpress Wiper Responsible for the Iranian Railway Attack

18 arrested for smuggling more than 490 migrants across the Balkan route

Experts Uncover Several C&C Servers Linked to WellMess Malware

Security Recruiter Directory

CSO’s guide to the worst and most notable ransomware

DevSecOps Training – Data Center Attack: The Game

Belarusian Nationals Arrested for Hacking ATMs Across Europe

5 Encrypted Messaging Apps for Mac, iPhone, and iPad

8 arrests following the seizure at sea of 15 tonnes of hashish by Spanish authorities

Several Malicious Typosquatted Python Libraries Found On PyPI Repository

Tech Mahindra CEO on using blockchain for financial services and healthcare solutions

New Aussie legislation to target use of personal information by social media

A New Wiper Malware Was Behind Recent Cyberattack On Iranian Train System

Want your endpoint security product in the ‘Microsoft Consumer Antivirus Providers for Windows’ ?

Malware and Trojans, but there’s only one horse the boss man wants to hear about

Cyberresilience: Your Data Insurance Policy

Apple Now Accepting UPI, Rupay Cards and Net Banking for App Store Payments in India

New infosec products of the week: July 30, 2021

Phony Call Centers Tricking Users Into Installing Ransomware and Data-Stealers

Why RaaS Has Become Easier to Launch

Meteor was the wiper used against Iran’s national railway system

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

Why isn’t cloud backup part of common security practices?

We can’t believe people use browsers to manage their passwords, says maker of password management tools

Pourquoi le concept de Confiance Zéro est-il plus important que jamais?

Engaging with governments is a data security priority

How to thwart phone hackers

DarkTrace Cyber Protects Fashion retailer Ted Baker

How to Protect Yourself from Gift Card Scams

What should IT leaders look for in an SD-WAN solution?

Clubhouse Ditches Exclusivity with General Release | Avast

Google claims no instances of foreign interference campaigns targeting Australia

Curious to see how healthcare cybersecurity fared this year?

Cybersecurity Professionals to Newcomers: Focus on Vendor-Neutral Certifications

Six existential threats posed by the future of 5G (Part Two)

Most marketers support federal consumer privacy protections

Cloud and security are top priorities for MSPs

Disinformation for hire: PR firms are the new battleground for Facebook

Employees want more AI in the workplace to improve productivity and decision making

WhiteSource Cure accelerates the delivery of secure software at scale

ZeroFox’s external threat hunting capabilities give analysts complete access to raw threat intelligence

Hikvision records 40% net profit uplift for 1H21 despite of COVID-19 and political conflict

Tackling the insider threat to the new hybrid workplace

Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years

Threat Stack provides full-stack observability into Amazon EKS on AWS Fargate

TrapX DeceptionGrid 7.2 protects containers against cryptojacking and other malicious attacks

Be The Strongest Link In Your Organization’s Supply Chain

How Digital ID can help citizens access government services from anywhere

Inmarsat ORCHESTRA integrates GEO, LEO and terrestrial 5G into one solution

Entrust nShield HSMs brings cryptographic services to VMware Tanzu Kubernetes Grid

DVL services from Windstream Enterprise modernize existing telephony environment

D-Link EAGLE PRO AI series optimizes the performance of home networks

Bosch enhances Praesensa portfolio with new ambient noise sensor

Home Affairs asks for a rush on Critical Infrastructure Bill to allow ASD to act lawfully

Cisco researchers spotlight Solarmarker malware

Ransomware attacks: How to protect against real-life data hostage threats

A Zero Trust Model for Securing Communications and Collaboration

CIS Secure expands portfolio of TSG devices with Poly 8300 conference phone

UfiSpace releases S9600 series open aggregation routers for broadband and mobile operator networks

Extreme Networks AP4000 platform delivers Wi-Fi 6E technology for high-density environments

China Cracks Down On Its Tech Giants. Sound Familiar?

Russian module suddenly fires thrusters after docking with space station

Blizzard confirms developer named in lawsuit was removed for “misconduct”

Feds list the top 30 most exploited vulnerabilities. Many are years old

U.S. in Crisis with Massive Shortfall of 500,000 Cyber Workforce Jobs

Terranova Security partners with Security Innovation to provide cyber security training for organizations

Deloitte collaborates with Palo Alto Networks to offer zero trust and multi-cloud cybersecurity solutions

Generated on 2021-07-31 23:55:31.288265